Cover Image
市場調查報告書

安全和漏洞管理的全球市場預測 2019年:安全·漏洞管理解決方案,安全·漏洞管理服務

Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), Services, End Users, & Verticals: Global Forecast to 2019

出版商 MarketsandMarkets 商品編碼 325461
出版日期 內容資訊 英文 136 Pages
訂單完成後即時交付
價格
Back to Top
安全和漏洞管理的全球市場預測 2019年:安全·漏洞管理解決方案,安全·漏洞管理服務 Security and Vulnerability Management Market by Solution (Siem, Policy and Compliance, Forensic and Incident Investigation, Device Vulnerability Assessment, Application Vulnerability Assessment), Services, End Users, & Verticals: Global Forecast to 2019
出版日期: 2015年03月02日 內容資訊: 英文 136 Pages
簡介

本報告提供全球安全和漏洞管理市場相關調查,提供您市場規模的變化與預測,彙整服務·終端用戶·各產業市場·各地區的明細,競爭情形,及主要企業簡介等詳細內容。

第1章 簡介

第2章 調查手法

第3章 摘要整理

第4章 重要考察

  • 安全和漏洞管理市場上富有魅力的市場機會
  • 安全和漏洞管理市場:各類型
  • 安全和漏洞管理市場:各服務市場
  • 各種地區的安全和漏洞管理市場
  • 生命週期分析:各地區

第5章 市場概要

  • 簡介
  • 發展的過程
  • 市場區隔
  • 市場動態

第6章 產業趨勢

  • 簡介
  • 價值鏈分析
  • 波特的五力分析
  • 策略性基準

第7章 安全和漏洞管理的全球市場:各類型

  • 簡介
  • 解決方案
    • 安全資訊·活動管理
    • 遵守法規政策
    • 法醫和事故調查
    • 設備漏洞評估
    • 應用漏洞評估
  • 服務
    • 諮詢
    • 支援
    • 整合

第8章 安全和漏洞管理的全球市場:各終端用戶

  • 簡介
  • SMB (中小企業)
  • 大企業

第9章 安全和漏洞管理的全球市場:各產業市場

  • 簡介
  • BFSI
  • IT·通訊
  • 政府·國防
  • 零售
  • 能源·公共事業
  • 醫療
  • 其他

第10章 地部門析

  • 簡介
  • 北美 (NA)
  • 歐洲
  • 亞太地區 (APAC)
  • 南美 (LA)
  • 其他地區 (ROW)

第11章 競爭情形

  • 概要
  • 競爭情形·趨勢

第12章 企業簡介

  • 簡介
  • EMC Corporation
  • Hewlett-Packard
  • IBM Corporation
  • Qualys
  • Symantec Corporation
  • Microsoft Corporation
  • Mcafee, Inc.
  • Netiq Corporation
  • Rapid7
  • Tripwire

第13章 附錄

目錄
Product Code: TC 3202

The global concerns over the rising severity of cyber threats are fuelling the demands for advanced security management solutions. The adoption of cloud technologies have resulted in restricting the operational and deployment costs of the organizations to a greater extent. The associated security risks are rising with the growing adoption of cloud services. Thus, the movement of enterprises toward cloud infrastructure is one of the major drivers for the security and vulnerability management market. The rising trend of Bring Your Own Device (BYOD) is expected to catapult the demands for vulnerability management solutions for device and application assessment.

Though the security and vulnerability management market is going strong in the near future, there are various factors restraining and posing relative challenges to the market. Though companies are equipped with advanced security management products, there still exists certain lack of awareness regarding vulnerability management solutions. The regulatory compliances and concerns regarding data breaches would continue to haunt the positive traction of the market.

The report also provides an insight about the opportunities in the market for the future. The rise in mobility is expected to have a major impact on the market and to provide greater opportunities with advanced vulnerability assessment solutions. The market is expected to see the evolution of next-generation cyber security solutions with the increasing severity of cyber threats.

The report gives an insight about the number of Small and Medium Businesses (SMBs), rapidly expanding throughout the globe. These companies do not possess the capital to maintain full-fledged security management solutions. Thus, the SMB segment relies on the post-impact diagnosis and prevention methods for cyber threats. Such factors are propelling the demands for forensics and incident investigation solutions catering to the SMBs.

Security and vulnerability management technologies are a very critical part of an organization's security strategy, as they create a consolidation point for various forms of security monitoring and can be utilized to spot a targeted attack in its early phases to reduce damage. North America is expected to be the largest market in terms of revenue contribution, while Asia-Pacific (APAC) is expected to experience increased market traction, during the forecast period.

Table of Contents

1. Introduction

  • 1.1. Objectives of the Study
  • 1.2. Market Definition
  • 1.3. Market Scope
    • 1.3.1. Markets Covered
    • 1.3.2. Years Considered in the Study
    • 1.3.3. Currency
  • 1.4. Limitations
  • 1.5. Stakeholders

2. Research Methodology

  • 2.1. Research Data
    • 2.1.1. Secondary Data
      • 2.1.1.1. Key Data From Secondary Sources
    • 2.1.2. Primary Data
      • 2.1.2.1. Key Data From Primary Sources
      • 2.1.2.2. Key Industry Insights
      • 2.1.2.3. Breakdown of Primaries
  • 2.2. Market Size Estimation
    • 2.2.1. Bottom-Up Approach
    • 2.2.2. Top-Down Approach
  • 2.3. Market Breakdown and Data Triangulation
  • 2.4. Research Assumptions and Limitations
    • 2.4.1. Assumptions
    • 2.4.2. Limitations

3. Executive Summary

4. Premium Insights

  • 4.1. Attractive Market Opportunities in Security and Vulnerability Management Market
  • 4.2. Security and Vulnerability Management: By Type
  • 4.3. Security and Vulnerability Management: Services Market
  • 4.4. Security and Vulnerability Management Market Across Various Regions
  • 4.5. Lifecycle Analysis, By Region, 2014

5. Market Overview

  • 5.1. Introduction
  • 5.2. Evolution
  • 5.3. Market Segmentation
    • 5.3.1. Security and Vulnerability Management Market
  • 5.4. Market Dynamics
    • 5.4.1. Drivers
      • 5.4.1.1. Enterprises Moving to the Cloud
      • 5.4.1.2. Increasing Government Compliance on Data Privacy
      • 5.4.1.3. Rising Threats From Cyber Attacks
    • 5.4.2. Restraints
      • 5.4.2.1. Lack of Awareness About Vulnerability Management Solutions
      • 5.4.2.2. Deployment Cost and Scalability
    • 5.4.3. Opportunities
      • 5.4.3.1. Growing Market of Mobility Devices and Web Platforms
      • 5.4.3.2. Evolution of Next-Generation Cyber Security Solutions
    • 5.4.4. Challenges
      • 5.4.4.1. Concerns About Data Breaches and Regulatory Compliance

6. Industry Trends

  • 6.1. Introduction
  • 6.2. Value Chain Analysis
  • 6.3. Porter's Five Forces Analysis
    • 6.3.1. Threat From New Entrants
    • 6.3.2. Threat of Substitutes
    • 6.3.3. Bargaining Power of Suppliers
    • 6.3.4. Bargaining Power of Buyers
    • 6.3.5. Intensity of Competitive Rivalry
  • 6.4. Strategic Benchmarking

7. Global Security and Vulnerability Management Market, By Type

  • 7.1. Introduction
  • 7.2. Solutions
    • 7.2.1. Security Information and Event Management
      • 7.2.1.1. Log and Event Management
      • 7.2.1.2. Firewall Security Management
      • 7.2.1.3. Patch Management
      • 7.2.1.4. Others
    • 7.2.2. Policy and Compliance
    • 7.2.3. Forensic and Incident Investigation
    • 7.2.4. Device Vulnerability Assessment
    • 7.2.5. Application Vulnerability Assessment
  • 7.3. Services
    • 7.3.1. Consulting
    • 7.3.2. Support
    • 7.3.3. Integration

8. Global Security and Vulnerability Management Market, By End User

  • 8.1. Introduction
  • 8.2. SMBS
  • 8.3. Enterprise

9. Global Security and Vulnerability Management Market, By Vertical

  • 9.1. Introduction
  • 9.2. BFSI
  • 9.3. It and Telecom
  • 9.4. Government and Defense
  • 9.5. Retail
  • 9.6. Energy and Utilities
  • 9.7. Healthcare
  • 9.8. Others

10. Geographic Analysis

  • 10.1. Introduction
  • 10.2. North America (NA)
  • 10.3. Europe
  • 10.4. Asia-Pacific (APAC)
  • 10.5. Latin America (LA)
  • 10.6. Middle East and Africa (MEA)

11. Competitive Landscape

  • 11.1. Overview
  • 11.2. Competitive Situation and Trends
    • 11.2.1. New Product/Service Developments
    • 11.2.2. Agreements, Partnerships, and Collaborations
    • 11.2.3. Mergers and Acquisitions
    • 11.2.4. Expansions

12. Company Profiles

  • 12.1. Introduction
  • 12.2. EMC Corporation
    • 12.2.1. Business Overview
    • 12.2.2. Solutions and Services
    • 12.2.3. Key Strategies
    • 12.2.4. Recent Developments, 2013-2014
    • 12.2.5. SWOT Analysis
    • 12.2.6. MNM View
  • 12.3. Hewlett-Packard
    • 12.3.1. Business Overview
    • 12.3.2. Solutions and Services
    • 12.3.3. Key Strategies
    • 12.3.4. Recent Developments, 2013-2014
    • 12.3.5. SWOT Analysis
    • 12.3.6. MNM View
  • 12.4. IBM Corporation
    • 12.4.1. Business Overview
    • 12.4.2. Solutions and Services
    • 12.4.3. Key Strategies
    • 12.4.4. Recent Developments, 2012-2014
    • 12.4.5. SWOT Analysis
    • 12.4.6. MNM View
  • 12.5. Qualys
    • 12.5.1. Business Overview
    • 12.5.2. Solutions and Services
    • 12.5.3. Key Strategies
    • 12.5.4. Recent Developments, 2012-2014
    • 12.5.5. SWOT Analysis
    • 12.5.6. MNM View
  • 12.6. Symantec Corporation
    • 12.6.1. Business Overview
    • 12.6.2. Solutions and Services
    • 12.6.3. Key Strategies
    • 12.6.4. Recent Developments, 2012-2014
    • 12.6.5. SWOT Analysis
    • 12.6.6. MNM View
  • 12.7. Microsoft Corporation
    • 12.7.1. Business Overview
    • 12.7.2. Solutions and Services
    • 12.7.3. Key Strategies
    • 12.7.4. Recent Developments, 2012-2014
    • 12.7.5. MNM View
  • 12.8. Mcafee, Inc.
    • 12.8.1. Business Overview
    • 12.8.2. Solutions and Services
    • 12.8.3. Key Strategies
    • 12.8.4. Recent Developments, 2012-2014
    • 12.8.5. MNM View
  • 12.9. Netiq Corporation
    • 12.9.1. Business Overview
    • 12.9.2. Solutions and Services
    • 12.9.3. Key Strategies
    • 12.9.4. Recent Developments, 2012-2014
    • 12.9.5. MNM View
  • 12.1. Rapid7
    • 12.10.1. Business Overview
    • 12.10.2. Solutions and Services
    • 12.10.3. Key Strategies
    • 12.10.4. Recent Developments, 2012-2014
    • 12.10.5. MNM View
  • 12.11. Tripwire
    • 12.11.1. Business Overview
    • 12.11.2. Solutions and Services
    • 12.11.3. Key Strategies
    • 12.11.4. Recent Developments, 2012-2014
    • 12.11.5. MNM View

13. Appendix

  • 13.1. Insights of Industry Experts
  • 13.2. Discussion Guide
  • 13.3. Introducing RT: Real-Time Market Intelligence
  • 13.4. Available Customizations
  • 13.5. Related Reports

List of Tables

  • Table 1: Assumptions of the Research Study
  • Table 2: Global Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Billion)
  • Table 3: Rising Threat From Cyber Security is Majorly Propelling the Growth of the Security and Vulnerability Management Market
  • Table 4: Lack of Awareness About Vulnerability Management Solutions Are Hampering the Growth of the Security and Vulnerability Management Market
  • Table 5: Evolution of Next-Generation Cyber-Security Solutions Has Created Opportunities for the Rise in Security and Vulnerability Management Market
  • Table 6: Concerns About Data Breaches and Regulatory Compliance Could Result in Major Security and Vulnerability Management Challenges
  • Table 7: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 8: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 9: SIEM Market Size, By Type, 2012-2019 ($Million)
  • Table 10: Log and Event Management Market Size, By Region, 2012-2019 ($Million)
  • Table 11: Firewall Security Management Market Size, By Region, 2012-2019 ($Million)
  • Table 12: Patch Management Market Size, By Region, 2012-2019 ($Million)
  • Table 13: Other SIEM Solutions Market Size, By Region, 2012-2019 ($Million)
  • Table 14: Policy and Compliance Market Size, By Region, 2012-2019 ($Million)
  • Table 15: Forensic and Incident Investigation Market Size, By Region, 2012-2019 ($Million)
  • Table 16: Device Vulnerability Assessment Market Size, By Region, 2012-2019 ($Million)
  • Table 17: Application Vulnerability Assessment Market Size, By Region, 2012-2019 ($Million)
  • Table 18: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 19: Consulting Market Size, By Region, 2012-2019 ($Million)
  • Table 20: Support Market Size, By Region, 2012-2019 ($Million)
  • Table 21: Integration Market Size, By Region, 2012-2019 ($Million)
  • Table 22: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 23: SMBS Market Size, By Region, 2012-2019 ($Million)
  • Table 24: Enterprise Market Size, By Region, 2012-2019 ($Million)
  • Table 25: Security and Vulnerability Management Market Size , By Vertical, 2012-2019 ($Million)
  • Table 26: BFSI Market Size, By Region, 2012-2019 ($Million)
  • Table 27: It and Telecom Market Size, By Region, 2012-2019 ($Million)
  • Table 28: Government and Defense Market Size, By Region, 2012-2019 ($Million)
  • Table 29: Retail Market Size, By Region, 2012-2019 ($Million)
  • Table 30: Energy and Utilities Market Size, By Region, 2012-2019 ($Million)
  • Table 31: Healthcare Market Size, By Region, 2012-2019 ($Million)
  • Table 32: Other Verticals Market Size, By Region, 2012-2019 ($Million)
  • Table 33: Security and Vulnerability Management Market Size, By Region, 2012-2019 ($Million)
  • Table 34: NA: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 35: NA: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 36: NA: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 37: NA: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 38: NA: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 39: NA: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 40: NA: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 41: Europe: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 42: Europe: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 43: Europe: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 44: Europe: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 45: Europe: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 46: Europe: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 47: Europe: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 48: APAC: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 49: APAC: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 50: APAC: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 51: APAC: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 52: APAC: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 53: APAC: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 54: APAC: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 55: LA: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 56: LA: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 57: LA: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 58: LA: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 59: LA: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 60: LA: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 61: LA: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 62: MEA: Security and Vulnerability Management Market Size, By Country, 2012-2019 ($Million)
  • Table 63: MEA: Security and Vulnerability Management Market Size, By Type, 2012-2019 ($Million)
  • Table 64: MEA: Security and Vulnerability Management Market Size, By Solution Type, 2012-2019 ($Million)
  • Table 65: MEA: Security and Vulnerability Management Market Size, By SIEM Solution Type, 2012-2019 ($Million)
  • Table 66: MEA: Security and Vulnerability Management Market Size, By Service, 2012-2019 ($Million)
  • Table 67: MEA: Security and Vulnerability Management Market Size, By End User, 2012-2019 ($Million)
  • Table 68: MEA: Security and Vulnerability Management Market Size, By Vertical, 2012-2019 ($Million)
  • Table 69: New Product/Service Developments, 2012-2014
  • Table 70: Agreements, Partnerships, and Collaborations, 2012-2014
  • Table 71: Mergers and Acquisitions, 2012-2014
  • Table 72: Expansions, 2012-2014

List of Figures

  • Figure 1: Security and Vulnerability Management Market: Stakeholders
  • Figure 2: Research Design
  • Figure 3: Bottom-Up Approach
  • Figure 4: Top-Down Approach
  • Figure 5: Limitations of the Research
  • Figure 6: Security and Vulnerability Management Market: By Type(Solutions), 2014
  • Figure 7: Security and Vulnerability Management Market Snapshot (2014 vs. 2019): SIEM Solution Constitutes the Largest Market
  • Figure 8: Large-Scale Implementation of Smarter Solutions Will Act as An Attractive Market Opportunity
  • Figure 9: Consulting Services to Grow With the Highest Rate During the Forecast
  • Figure 10: Integration Service Has Gained Largest Demand and Market Share in the Year 2014
  • Figure 11: North America to Be the Most Lucrative Security and Vulnerability Management Market in 2014
  • Figure 12: APAC Security and Vulnerability Management Market is Expected to Be in the High Growth Phase in the Near Future
  • Figure 13: Evolution of Security and Vulnerability Management Market
  • Figure 14: Security and Vulnerability Management Segmentation
  • Figure 15: Greater Adoption of Cloud By Enterprises Would Drive the Security and Vulnerability Management Market
  • Figure 16: Value Chain Analysis
  • Figure 17: Porter's Five Forces Analysis: Security and Vulnerability Management Market
  • Figure 18: IBM Adopted All-Round Strategies for Technology Integration and Product Enhancement
  • Figure 19: Security and Vulnerability Management Solution to Exhibit the Highest CAGR During the Forecast Period
  • Figure 20: Application Vulnerability Assessment to Remain in High Growth During the Forecast Period
  • Figure 21: Log and Event Management Continues to Dominate in the SIEM Segment
  • Figure 22: Consulting Services Show A High Growth During the Forecast
  • Figure 23: SMBS Segment to Exhibit the Highest CAGR During the Forecast Period
  • Figure 24: BFSI is Expected to Show Greater Demand in the Market During the Forecast
  • Figure 25: NA to Have Major Share of the Market During the Forecast Period(2014-2019)
  • Figure 26: The Solution Snapshot Across Regions Shows A Favorable Market in the APAC Region
  • Figure 27: North America Market Snapshot: Strict Government Regulations to Drive Higher Adoption in the Market
  • Figure 28: Asia-Pacific Market Snapshot: the Rapidly Growing Internet Devices Will Fuel the Need for Greater Network Security
  • Figure 29: Companies Adopted New Product/Service Developments as the Key Growth Strategies Over the Last 3 Years
  • Figure 30: New Product/Service Developments Would Fuel the Intense Competition in the Market
  • Figure 31: IBM Considered as A Forerunner in Providing Comprehensive Solutions Portfolio
  • Figure 32: Battle for Market Share: New Product/Service Developments Has Been Seen as the Key Strategy for Company Growth
  • Figure 33: Geographic Revenue Mix of Top 5 Market Players
  • Figure 34: EMC: Company Snapshot
  • Figure 35: EMC: SWOT Analysis
  • Figure 36: Hewlett-Packard: Company Snapshot
  • Figure 37: Hewlett-Packard: SWOT Analysis
  • Figure 38: IBM: Company Snapshot
  • Figure 39: IBM: SWOT Analysis
  • Figure 40: Qualys: Company Snapshot
  • Figure 41: Qualys: SWOT Analysis
  • Figure 42: Symantec: Company Snapshot
  • Figure 43: Symantec: SWOT Analysis
  • Figure 44: Microsoft: Company Snapshot
Back to Top